Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:21
Static task
static1
Behavioral task
behavioral1
Sample
3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe
Resource
win10v2004-20230220-en
General
-
Target
3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe
-
Size
689KB
-
MD5
81ed4ea10d7dd8cf5f9742a7e26b989f
-
SHA1
4be223188c079f07871026fc25022727f5f1173b
-
SHA256
3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35
-
SHA512
c2112d86d5fd54ed0a08782565b4a9224e51636332daa30baf3e0751cc3747ec0870c2da7276a3863a68f8d9932ae52d35049c9ee7fa8f4b5cab94ef9310fb5a
-
SSDEEP
12288:YMrCy90WJdkS9B6XCqFHyp65hLumL6caOyzjCGERAamJov+FNgfigfT2/S1+U4jX:6ypIHSUfaEraBzjgAamJo6NgagfV+U4z
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro0978.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0978.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0978.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3780-191-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-192-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-197-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-200-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-196-0x0000000005F70000-0x0000000005F80000-memory.dmp family_redline behavioral1/memory/3780-202-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-204-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-206-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-208-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-210-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-212-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-214-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-216-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-218-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-220-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-222-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-224-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-226-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline behavioral1/memory/3780-228-0x0000000005F10000-0x0000000005F4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un620548.exepro0978.exequ5981.exesi459649.exepid process 4860 un620548.exe 2024 pro0978.exe 3780 qu5981.exe 4004 si459649.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0978.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0978.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0978.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exeun620548.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un620548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un620548.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5108 2024 WerFault.exe pro0978.exe 1832 3780 WerFault.exe qu5981.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0978.exequ5981.exesi459649.exepid process 2024 pro0978.exe 2024 pro0978.exe 3780 qu5981.exe 3780 qu5981.exe 4004 si459649.exe 4004 si459649.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0978.exequ5981.exesi459649.exedescription pid process Token: SeDebugPrivilege 2024 pro0978.exe Token: SeDebugPrivilege 3780 qu5981.exe Token: SeDebugPrivilege 4004 si459649.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exeun620548.exedescription pid process target process PID 2840 wrote to memory of 4860 2840 3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe un620548.exe PID 2840 wrote to memory of 4860 2840 3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe un620548.exe PID 2840 wrote to memory of 4860 2840 3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe un620548.exe PID 4860 wrote to memory of 2024 4860 un620548.exe pro0978.exe PID 4860 wrote to memory of 2024 4860 un620548.exe pro0978.exe PID 4860 wrote to memory of 2024 4860 un620548.exe pro0978.exe PID 4860 wrote to memory of 3780 4860 un620548.exe qu5981.exe PID 4860 wrote to memory of 3780 4860 un620548.exe qu5981.exe PID 4860 wrote to memory of 3780 4860 un620548.exe qu5981.exe PID 2840 wrote to memory of 4004 2840 3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe si459649.exe PID 2840 wrote to memory of 4004 2840 3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe si459649.exe PID 2840 wrote to memory of 4004 2840 3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe si459649.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe"C:\Users\Admin\AppData\Local\Temp\3c781cca74c4b5fd1930214577d131f31bff0f6e66c04ceb2b1ad6ac98543c35.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620548.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620548.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0978.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0978.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 10804⤵
- Program crash
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5981.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5981.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 13284⤵
- Program crash
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si459649.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si459649.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2024 -ip 20241⤵PID:4792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3780 -ip 37801⤵PID:2088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD520fff8296abd468ce9489c457ada899f
SHA118491e1f8fb01a07db75078d01f4fc6d618befb3
SHA25654ffaad06090ad49e2884af8b1f8ee4f7ff1b9c15c2cb084fb839ad11e4bc26e
SHA5125b62473ad24dae3c9618f3aabfcaca0879516d6307e371958c1aa55d778ad426e2a87e3fa704cc9dd9d4ad3f92f26d4130cfeca171a8f879bbcb3d7a1c5814b1
-
Filesize
175KB
MD520fff8296abd468ce9489c457ada899f
SHA118491e1f8fb01a07db75078d01f4fc6d618befb3
SHA25654ffaad06090ad49e2884af8b1f8ee4f7ff1b9c15c2cb084fb839ad11e4bc26e
SHA5125b62473ad24dae3c9618f3aabfcaca0879516d6307e371958c1aa55d778ad426e2a87e3fa704cc9dd9d4ad3f92f26d4130cfeca171a8f879bbcb3d7a1c5814b1
-
Filesize
547KB
MD517db7b79eef6138771d1fe415987fd3d
SHA131b653967a2a0b020d8ccb1087977ec8f10b2d6a
SHA25614702200b2177c18502d9f75d60a71d84fe919df6c9d50b8231c49e1ed929f96
SHA512ffd98d2e5a440e5e8019ba6e11beb2869f5158d1593ac942e569461164abd33a04451bf83a9c35b17b683207c0c531418eb65988bcf162167fe04a5b4efa031a
-
Filesize
547KB
MD517db7b79eef6138771d1fe415987fd3d
SHA131b653967a2a0b020d8ccb1087977ec8f10b2d6a
SHA25614702200b2177c18502d9f75d60a71d84fe919df6c9d50b8231c49e1ed929f96
SHA512ffd98d2e5a440e5e8019ba6e11beb2869f5158d1593ac942e569461164abd33a04451bf83a9c35b17b683207c0c531418eb65988bcf162167fe04a5b4efa031a
-
Filesize
291KB
MD549780f72fa6f1d990a1cc8e8097e227f
SHA13e6ba08e0e7ba292da9e895b8618c489d9e4266d
SHA256c48e9e02f178dd8a013477e690cb83a6b6f853106a3c3e74cd9a51c898d8720f
SHA512407e881f9dd2dac89f484dc51bd15d28e2723260aa57bc0401eafee3a934bf931a93b92ed70b403a6fe57d4e397e47569c2badf016bc1b6abd064baadb1a938c
-
Filesize
291KB
MD549780f72fa6f1d990a1cc8e8097e227f
SHA13e6ba08e0e7ba292da9e895b8618c489d9e4266d
SHA256c48e9e02f178dd8a013477e690cb83a6b6f853106a3c3e74cd9a51c898d8720f
SHA512407e881f9dd2dac89f484dc51bd15d28e2723260aa57bc0401eafee3a934bf931a93b92ed70b403a6fe57d4e397e47569c2badf016bc1b6abd064baadb1a938c
-
Filesize
345KB
MD551cef8b0da55e9900eb9494494800beb
SHA1c4ef81f88e38082747c17311845111a8b39e8ca9
SHA25621aba9c97c49e010138ff97897ead098f71ff7f4e7d6167e649d09be3400edcd
SHA51287f7d3e4e08271d4f84284f6b08830c6704b5de732c2745c4941ea201f2bacd9a38177f28676d8c335ea8c3ec0e8786ee2f021a5a01dd207f86edec7a2447571
-
Filesize
345KB
MD551cef8b0da55e9900eb9494494800beb
SHA1c4ef81f88e38082747c17311845111a8b39e8ca9
SHA25621aba9c97c49e010138ff97897ead098f71ff7f4e7d6167e649d09be3400edcd
SHA51287f7d3e4e08271d4f84284f6b08830c6704b5de732c2745c4941ea201f2bacd9a38177f28676d8c335ea8c3ec0e8786ee2f021a5a01dd207f86edec7a2447571